Executive, IT Security
JOB PURPOSE
An IT Security Threat and Identity Analyst provides technical assistance with the detection, analysis and supporting the gaps mitigation on infrastructure and application vulnerabilities with the Group. A hands-on technical specialist and security monitoring analyst, the Analyst handles complex and detailed technical work necessary to establish and maintain technical security controls
.
The Threat and Identity Analyst shall provide regular reports on significant cyber threats and risks to business from various cyber threat information gathering. Main responsibilities for the Threat and Identity Analyst would be to hunting down the threat within the Group infrastructure by a compilation of cyber threat data gathered through independent research and analysis from emerging technology, techniques, and adversarial capabilities & tactics.
JOB RESPONSIBILITIES
- Analyze cyber threat Indications & warnings from open-source cyber threat information correlating internal activity to external indicators across numerous boundaries
- Analyzes vulnerability scanning results and review the relevant security logs from relevant devices including SIEM and report them monthly to the Head of Section.
- Perform regular network, system and application vulnerability scanning to detect and support vulnerabilities mitigation. Lead the response triage, proactive analysis and identification of suspicious cybersecurity related behavior in the network, systems and application.
- Build strong, credible relationship with the ICT team (network, infra and application) with advisory on threat vulnerability analysis gain from various threat intelligence data
- Optimizes threat detection products for data loss prevention (DLP), security information and event management (SIEM), endpoint detection and response (EDR), antivirus and other industry standard security technologies.
- Regular tracking and drive the vulnerability management program to ensure timely closure of vulnerabilities detected. Actively investigate the latest in security vulnerabilities, advisories, Incidents, and penetration techniques and notify stakeholders when appropriate.
- Evaluates information system bug reports, security exploit reports, and other information security notices issued by information system vendors, government agencies, universities, professional associations, and other organizations, and as needed makes recommendations to internal management to take precautionary steps.
- Execute IT Security projects in collaboration with IT Security practice.
- To operate Security Awareness Training and phishing assessment for enhancing the awareness of MNRB Group's staff for cybersecurity threat.
QUALIFICATION & REQUIREMENT
- Bachelor's or Master's degree in related IT Security or Network Security Field
- Certification in relevant identity security or technical security will be added advantage
- Experience and knowledge of industry leading security event management, network security monitoring, log collection and correlation practises,process improvement, business contiunity, plan and report writing.
- Knowledge of malware & hacking analysis and contextualize threat intelligent would be and added advantage
- Fresh graduates from related fields are encouraged to apply
- 2 position available
JOB PURPOSE
An IT Security Threat and Identity Analyst provides technical assistance with the detection, analysis and supporting the gaps mitigation on infrastructure and application vulnerabilities with the Group. A hands-on technical specialist and security monitoring analyst, the Analyst handles complex and detailed technical work necessary to establish and maintain technical security controls
.
The Threat and Identity Analyst shall provide regular reports on significant cyber threats and risks to business from various cyber threat information gathering. Main responsibilities for the Threat and Identity Analyst would be to hunting down the threat within the Group infrastructure by a compilation of cyber threat data gathered through independent research and analysis from emerging technology, techniques, and adversarial capabilities & tactics.
JOB RESPONSIBILITIES
- Analyze cyber threat Indications & warnings from open-source cyber threat information correlating internal activity to external indicators across numerous boundaries
- Analyzes vulnerability scanning results and review the relevant security logs from relevant devices including SIEM and report them monthly to the Head of Section.
- Perform regular network, system and application vulnerability scanning to detect and support vulnerabilities mitigation. Lead the response triage, proactive analysis and identification of suspicious cybersecurity related behavior in the network, systems and application.
- Build strong, credible relationship with the ICT team (network, infra and application) with advisory on threat vulnerability analysis gain from various threat intelligence data
- Optimizes threat detection products for data loss prevention (DLP), security information and event management (SIEM), endpoint detection and response (EDR), antivirus and other industry standard security technologies.
- Regular tracking and drive the vulnerability management program to ensure timely closure of vulnerabilities detected. Actively investigate the latest in security vulnerabilities, advisories, Incidents, and penetration techniques and notify stakeholders when appropriate.
- Evaluates information system bug reports, security exploit reports, and other information security notices issued by information system vendors, government agencies, universities, professional associations, and other organizations, and as needed makes recommendations to internal management to take precautionary steps.
- Execute IT Security projects in collaboration with IT Security practice.
- To operate Security Awareness Training and phishing assessment for enhancing the awareness of MNRB Group's staff for cybersecurity threat.
QUALIFICATION & REQUIREMENT
- Bachelor's or Master's degree in related IT Security or Network Security Field
- Certification in relevant identity security or technical security will be added advantage
- Experience and knowledge of industry leading security event management, network security monitoring, log collection and correlation practises,process improvement, business contiunity, plan and report writing.
- Knowledge of malware & hacking analysis and contextualize threat intelligent would be and added advantage
- Fresh graduates from related fields are encouraged to apply
- 2 position available